O'Reilly logo

OCA Oracle Database 11g: Database Administration I: A Real-World Certification Guide by Steve Ries

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understanding role-based security

When our task is limited to granting permissions to a select few users, what we've learned this far using GRANT and REVOKE would likely suffice. However, a real-world security approach may require us to manage the grants of thousands of users for hundreds of database objects. Were we to use individual grants for each of these users, mistakes would likely be made. Certain users would not have the necessary permissions and, worse still, users may be granted higher access than they require. We need a way to ease this burden and make managing permissions more efficient. To this end, we discuss the subject of role-based security.

Using system roles

In Oracle, a role is simply a container for a group of any other directly ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required